night city banner

Cybersecurity Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
AI, Quantum, and the New Threat Frontier
Thales
AI, Quantum, and the New Threat Frontier: What Will Define Cybersecurity in 2026?

If we think 2025 has been fast-paced, it’s going to feel like a warm-up for the changes on the horizon in 2026. Every time this year, Thales experts become cybersecurity…

Read More
The Biggest Cyber Stories of the Year
Thales
The Biggest Cyber Stories of the Year: What 2025 Taught Us

2025 didn’t just test cybersecurity; it redefined it.From supply chains and healthcare networks to manufacturing floors and data centers, the digital world was reminded…

Read More
Imperva AI Application Security
Michael Wright
Thales Introduces Imperva AI Application Security

Today, 67% of organizations globally are adopting or building in-house LLMs and GenAI applications. Just under 70% of respondents to the Thales 2025 Data Threat Report regard…

Read More
Empowering Security and Control
Scotti Woolery-Price
Empowering Security and Control: Thales CipherTrust Cloud Key Management Integrates with Oracle Fusion Cloud Services

In a landscape where the safeguarding of sensitive information is paramount, the collaboration between Thales and Oracle Fusion Cloud Services helps create operational…

Read More
Thales in 2025 Analyst Recognition Certifications Awards, and Events
Chad Couser
Thales in 2025: Analyst Recognition, Certifications, Awards, and Events

It’s that time again. The holidays are fast approaching, the nights are drawing in, and the temperatures are falling. That means it's time to reflect on our successes over the…

Read More
eXtended Enterprise Access
Haider Iqbal
eXtended Enterprise Access: The Missing Piece in your IAM Strategy

Workforce IAM has reached a certain level of maturity, but a burning problem lies at its periphery – the problem of managing third-party or partner identities. The complex yet…

Read More